Question
Please answer them ALL for me to understand 11.What technology has made trojans easy to distribute? Choose the best answer. Choice a EXE wrappers Choice
Please answer them ALL for me to understand
11.What technology has made trojans easy to distribute? Choose the best answer.
Choice a
EXE wrappers
Choice b
Digitally Signed Software
Choice c
Assembly language
Choice d
Personal firewall software
12. A disadvantage of single sign-on is:
Choice a
Repeated use of the same passwords.
Choice b
Consistent time-out enforcement across platforms.
Choice c
Forcing password changes on all subordinate systems.
Choice d
A compromised password exposes all authorized resources.
13. An IPsec security association includes ___
Choice a
the Diffie-Hellman key exchange crypto variable
Choice b
the IKE
Choice c
IP address of the distant end
Choice d
IP address of the originating computer
14. Which of the following tools would be most effective for sniffing RDP (Remote Desktop Connection) logins? (choose one.)
Choice a
Wireshark
Choice b
dsniff
Choice c
macof
Choice d
Cain and Abel
15. What is the purpose of a hash function?
Choice a
To provide integrity
Choice b
To create a value that cannot be repudiated by its sender
Choice c
To obfuscate a data segment such that it cannot be deciphered without a key
Choice d
To preserve a copy of all of the information from the original data segment
16. Which of the following is true regarding varying skill sets with regards to technical staff?
Choice a
Valuable employees should be focused on specialized functions and skill sets.
Choice b
The organization should ensure employees have overlapping skills when possible to prevent single points of failure
Choice c
Managerial skills (soft skills) should be prioritized over technical skills.
Choice d
Valuable IT employees need to possess the skill sets for any job in IT.
17. What sniffer program is capable of reconstructing associated TCP packets into a session showing application layer data from the client to the server and vice-versa?
Choice a
ARPwatch
Choice b
Packetyzer
Choice c
Etherape
Choice d
Wireshark
18. Methodology is one of the most important factors of success while doing a security test. Which of the following steps would represent the first step that is done either by a malicious cracker or a penetration tester?
Choice a
Scanning
Choice b
Enumeration
Choice c
Footprinting
Choice d
19. Which of the following types of attacks is the hardest to detect and prevent?
Choice a
Viruses that are hidden in exe's and attached to email
Choice b
DDoS attacks against web services
Choice c
Exploits against web applications such as SQL injection and buffer overflows
Choice d
Web pages with malicious executable content
20. Which of these terms is MOST closely related to integrity?
Choice a
Trustworthiness
Choice b
Auditability
Choice c
Reliability
Choice d
Need-to-know
21. A digital signature does NOT ___
Choice a
use asymmetric keys.
Choice b
provide non-repudiation of origin.
Choice c
provide confidentiality
Choice d
provide proof of integrity.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started